12
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Differences and Similarities in Characterizing Terrorists: A Comparison of American and Russian Samples After 9/11

, PhD
Pages 261-278 | Published online: 07 Jul 2016

References

  • deMause, L. (2002). The childhood origins of terrorism. Journal of Psychohistory, 29, 340–348.
  • Dublin, J. E. (1985). The terrorized patient as brutalized person. Psychotherapy Patient, 1, 75–85.
  • Fritzon, K., Canter, D., & Wilton, Z. (2001). The application of an action system model to destructive behaviour: The examples of arson and terrorism. Behavioral Sciences & the Law, 19, 657–690.
  • Hilton, D. J., Smith, R. H., & Kin, S. (1995). Processes of causal explanation and dispositional attribution. Journal of Personality and Social Psychology, 68, 377–387.
  • Hoffman, M. L. (1990). Empathy and justice motivation. Motivation & Emotion, 14, 151–172.
  • Holden, C. (1979). Study of terrorism emerging as an international endeavor. Science, 203, 33–35.
  • Holmes, R. M., & DeBurger, J. E. (1985). Profiles in terror: The serial murderer. Federal Probation, 49, 29–34.
  • Johnson, P. W., & Feldmann, T. B. (1992). Personality types and terrorism: Selfpsychology perspectives. Forensic Reports, 5, 293–303.
  • Jones, E. E. (1979). The rocky road from acts to dispositions. American Psychologists, 34, 107–117.
  • Koopman, C., Shiraev, E., McDermott, R., Jervis, R., & Snyder, J. (1998). Beliefs about international security and change in 1992 among Russian and American national security elites. Peace & Conflict: Journal of Peace Psychology, 4, 35–57.
  • Kurcz, I., Polkowska, A., & Potocka-Hoser, A. (1990). Cognitive aspects of political stereotypes. Studia Psychologica, 32, 5–22.
  • Lachkar, J. (2002). The psychological make-up of a suicide bomber. Journal of Psychohistory, 29, 349–367.
  • McCauley, C. R., & Segal, M. E. (1987). Social psychology of terrorist groups. In C. Hendrick (Ed.), Group processes and intergroup relations: Review ofpersonality and social psychology, Vol. 9.
  • Newbury Park, CA: Sage.
  • Norenzayan, A., & Nisbett, R. E. (2000). Culture and causal cognition. Current Directions in Psychological Science, 9, 132–135.
  • Olsson, P. A. (1988). The terrorist and the terrorized: Some psychoanalytic consideration. Journal of Psychohistory, 16, 47–60.
  • Peck, C. (1990). Conflict management and the prevention of war. Australian Psychology, 25, 3–14.
  • Sakuta, A., & Fukushima, A. (1998). Two skyjacker case studies. International Medical Journal, 5, 301–311.
  • Shaw, E. D. (1986). Political terrorists: Dangers of diagnosis and an alternative to the psychopathology model. International Journal of Law & Psychiatry, 8, 359–368.
  • Shuman, H. (1983). Survey research and the fundamental attribution error. Personality & Social Psychology Bulletin, 9, 103–104.
  • Silke, A. (1998). Cheshire-Cat logic: The recurring theme of terrorist abnormality in psychological research. Psychology, Crime & Law, 4, 51–69.
  • Smith, B. L., & Morgan, K. D. (1994). Terrorists right and left: Empirical issues in profiling American terrorists. Studies in Conflict & Terrorism, 17, 39–57.
  • Takooshian, H., & Verdi, W. M. (1995). Assessment of attitudes toward terrorism. In L. L. Alder & F. L. Denmark (Eds.). Violence and the prevention of violence (pp. 3343). Westport, CT: Praeger.
  • Wilson, D., & Bennett, V. Y. (1994). Determinants of the attribution of racism. Journal of Social Behavior & Personality, 9, 489–498.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.